http://pastebin.com/7W0uDrLa
If you need an extensive list of hacker requests (over 200), I put this
log entry on pastebin. As mentioned at the top of the pastebin, the
hacker used my IP address directly rather than my doman name.
I have a "map" that detects typical hacker activity. Perhaps in my "map"
of triggers, I should look for bypassing the domain name, that is
requests directly to my IP address. There is nothing particularly evil
in using my IP address rather than domain name, but would any real user
ever use my IP address? Kind of doubtful.